Defending Polymorphic Worms in Computer Network using Honeypot
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 10
Abstract
Polymorphic worms are a major threat to internet infrastructure security. In this mechanism we are using gate-translator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV,which attracts polymorphic worms. We are proposing an algorithm to detect and remove polymorphic worms and innocuous traffic related packets.
Authors and Affiliations
R. Goswamia
Impact Factors of IT Flexibility within Cloud Technology on Various Aspects of IT Effectiveness
Cloud computing Adoption has achieved an essential inflection factor; this is affecting IT and business models and strategies all through the industries. There is a lack of empirical evidence how the adoption of cloud te...
Clustering: Applied to Data Structuring and Retrieval
Clustering is a very useful scheme for data structuring and retrieval behuhcause it can handle large volumes of multi-dimensional data and employs a very fast algorithm. Other forms of data structuring techniques include...
A Review of State-of-the-Art on Wireless Body Area Networks
During the last few years, Wireless Body Area Networks (WBANs) have emerged into many application domains, such as medicine, sport, entertainments, military, and monitoring. This emerging networking technology can be use...
Multi-Depots Vehicle Routing Problem with Simultaneous Delivery and Pickup and Inventory Restrictions: Formulation and Resolution
Reverse logistics can be defined as a set of practices and processes for managing returns from the consumer to the manufacturer, simultaneously with direct flow management. In this context, we have chosen to study an imp...
Survey of Techniques for Deep Web Source Selection and Surfacing the Hidden Web Content
Large and continuously growing dynamic web content has created new opportunities for large-scale data analysis in the recent years. There is huge amount of information that the traditional web crawlers cannot access, sin...